Posts

Showing posts from October, 2022

what is internet and IP address

Image
       Internet  What is internet-: Internet is a network of network that is use to interconnect many different type of computers all over the world, we can  share file ,data everything etc one computer to another computer all over the world ,internet is wide area network it is easily to use  everywhere with the help of submarine cables Submarine cables-: it is used to connect to the internet. IP address  IP-: IP address is unique number provided to each and every device it use use to connecting to internet and internet identify users with the help of IP address IP address is logical address its full form is(internet protocol),it is the form of integeric number which is separated by dot(.) Ex-: 192.168.45.15    There are two type of IP address 1.Private IP : It is use to connect to internet they are connect local or personal devices router provide private IP and connect within devices, phone, laptop, printer, scanner, etc connec...

malware or virus

Image
           C omputer  v irus                                              computer virus/malware:   C omputer virus is malicious program ,It is design to gathering information victim system and network and destroyed sensitive data gaining  access victim system and network.   (The first computer virus is creeper )                                            Type of Computer Virus virus/malware Ransomware Spyware Trojan adware worms 1.Ransomware:    Ransomware is a virus , inbuild  any file and software entry  in your system and   encrypt data in your system. 2.Spyware:   Spyware is a malicious program ,inbuild any file and software hidden e...

What is CIA triad

Image
                               Cyber security elements                                                               What is CIA  Triad-:   This is the security model basically it is use to protect data and information (it full form is Confidentiality  Integrity Availability)                                                      1. confidentiality-:     it allow authorized user to access sensitive &protected data .The data sent over the network should not be access by unauthorized user/Third person  ex-: attacker will try to ca...

Hacking overview and type of hacker

Image
    Ethical hacking- overview   Hacking is use legal as long as it is being done to find weaknesses in computer or network system for testing purpose this sort of hacking is what will call ethical hacking.               Type  of Hacking   1. website hacking:   Hacking website means taking unwanted control over a web server and it associated software such as data base and other interface. 2. Network hacking:  Hacking a network means gathering information about a network by using tools like ,ns lookup ping , Trace etc. With the internet to harm the network system and hamper its operation. 3.Email hacking :  It include getting unauthorized access on a email account and using it workout tasking the consent of its owner. 4. Password Hacking:  This is the process of recovering secret. Password from data that has been stored in or transmitted by a computer system. 5.Computer Hacking:  This is the process of...